Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
85179dcefb0ad2d2d5049c53d093e700N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
85179dcefb0ad2d2d5049c53d093e700N.exe
Resource
win10v2004-20240709-en
General
-
Target
85179dcefb0ad2d2d5049c53d093e700N.exe
-
Size
78KB
-
MD5
85179dcefb0ad2d2d5049c53d093e700
-
SHA1
fa2570fd80b7366207c2eaa307a8b930e1b8e866
-
SHA256
4c16d4255077e312e81bdaff984b65fab478179e7c302be88e01a40648026d9d
-
SHA512
1b9e56e6cfe66b20eeba4e8672f7d947c6e10be3f78502bc7fcbc620055ce7ea92f09d0d2ae291819999217c7bc3d0261c5a27b1554566028011301327331646
-
SSDEEP
1536:NHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtk9/op1RA:NHFonhASyRxvhTzXPvCbW2Uk9/oW
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
85179dcefb0ad2d2d5049c53d093e700N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 85179dcefb0ad2d2d5049c53d093e700N.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp78F9.tmp.exepid process 316 tmp78F9.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp78F9.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmp78F9.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cvtres.exetmp78F9.tmp.exe85179dcefb0ad2d2d5049c53d093e700N.exevbc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp78F9.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85179dcefb0ad2d2d5049c53d093e700N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
85179dcefb0ad2d2d5049c53d093e700N.exetmp78F9.tmp.exedescription pid process Token: SeDebugPrivilege 3932 85179dcefb0ad2d2d5049c53d093e700N.exe Token: SeDebugPrivilege 316 tmp78F9.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
85179dcefb0ad2d2d5049c53d093e700N.exevbc.exedescription pid process target process PID 3932 wrote to memory of 4608 3932 85179dcefb0ad2d2d5049c53d093e700N.exe vbc.exe PID 3932 wrote to memory of 4608 3932 85179dcefb0ad2d2d5049c53d093e700N.exe vbc.exe PID 3932 wrote to memory of 4608 3932 85179dcefb0ad2d2d5049c53d093e700N.exe vbc.exe PID 4608 wrote to memory of 2080 4608 vbc.exe cvtres.exe PID 4608 wrote to memory of 2080 4608 vbc.exe cvtres.exe PID 4608 wrote to memory of 2080 4608 vbc.exe cvtres.exe PID 3932 wrote to memory of 316 3932 85179dcefb0ad2d2d5049c53d093e700N.exe tmp78F9.tmp.exe PID 3932 wrote to memory of 316 3932 85179dcefb0ad2d2d5049c53d093e700N.exe tmp78F9.tmp.exe PID 3932 wrote to memory of 316 3932 85179dcefb0ad2d2d5049c53d093e700N.exe tmp78F9.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe"C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uos9cmna.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7A9E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BCFF4F6F9204328989DB9C9C92A7D5E.TMP"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exe" C:\Users\Admin\AppData\Local\Temp\85179dcefb0ad2d2d5049c53d093e700N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES7A9E.tmpFilesize
1KB
MD527736979b520c0e922a500b42efd7dc7
SHA126a8209e0f8b6f12ba50b567a1e92ed0528cf8b0
SHA256457942026fbdd48df4326f854cfc0f275be4e1e4c82d2ad737c070b2a9ca4de6
SHA51223a5f9c3431cd67409b76114150552a11ec5d5270ff538f386b362df862543904485463d80e3d421e84126ef1d9a9568c851a7c88c12bfb29a2815c5db560eb0
-
C:\Users\Admin\AppData\Local\Temp\tmp78F9.tmp.exeFilesize
78KB
MD5ed040e015b25fa32500d23132508f57a
SHA134f53ee34afa4a54316eac41e4067173e78c7725
SHA2569f51890753d3c7adf1ae1e45f8d9eda55f443e4dd3a55b6ff7417b6e2521de60
SHA512efce091a88b46cfe9896fc56de718e23357a115600dc360c979f9e46ef90fd718205edb0a8b427ab44b827875e021f9501d32c24e8b444bfe5bc2fe10056298d
-
C:\Users\Admin\AppData\Local\Temp\uos9cmna.0.vbFilesize
15KB
MD590ef1f981900febf5098f12a9ab87c65
SHA1d231b6438d7dcabc0991a23d4524df9bd89f763d
SHA256110658879e84bf3e788e2d88c3fe9d8cd9fa74b5b06c55e3ad730c244ce4bc52
SHA5127b3a193e054475d1893d5614455decc9eb2df7ced1ab9aed8f5a66b9262a203fc3c744d3372bf7306db0ac57a7951b848eb9b38acd64d1a9dc2bab0624ad6006
-
C:\Users\Admin\AppData\Local\Temp\uos9cmna.cmdlineFilesize
266B
MD53d398857aadb0a9725e279eb0ce94a64
SHA15729a8fd8025272c0b5b978a3620cc50cb33de7d
SHA25628c2a101089fb319c0212f3bf3431d55d7b84f2f83eadd5898e330551d359c05
SHA5126af9a289f51645ce9c52651e421790031ae292218257388c69471a6cbdcefebc37b9e834531f45066388bb2c0a3d12d7b88a8de80ea366240dcf373e77a6d8fe
-
C:\Users\Admin\AppData\Local\Temp\vbc4BCFF4F6F9204328989DB9C9C92A7D5E.TMPFilesize
660B
MD5628e0dec4f1672d006228ce215577a39
SHA1d38c23bc36d7af23228d93347e5cb8bd522aa77f
SHA256f293a6579094bfa8c596db31d40a9d70f29f345ebb388e8311ca2901ef77efc5
SHA51293511bce3d8fa6d62420ad17eb26202beed60a01233dc32e41c0d13fd358a107e541564c74cd1edbc0cb9a793529171ca37878c3fef885018c523f9f5db0d465
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c
-
memory/316-23-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/316-24-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/316-26-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/316-27-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/316-28-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3932-2-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3932-1-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3932-22-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/3932-0-0x0000000075432000-0x0000000075433000-memory.dmpFilesize
4KB
-
memory/4608-8-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB
-
memory/4608-18-0x0000000075430000-0x00000000759E1000-memory.dmpFilesize
5.7MB